More misconceptions clarified about the meaning of storage archiving, plus criteria you should use to make smart archive purchases.
One technology strategy sure to be strategic is data archiving. We clear up several misconceptions about the technology.
Don't develop your backup plan based on what your DR software can do. Band-Aid fixes won't help -- we need to think about what and how you back up in a whole new way.
To help IT manage its file deluge, vendors are trying to develop a platform that delivers respectable performance for file access vendors. They're really just building a bigger junk drawer.
In 2010, vendor marketing campaigns will ramp up with the usual hype.
Few storage technology products invent a market. Rather, they respond to market requirements.
These best practices will help you get the maximum return from your storage budget while streamlining the overall performance and reliability of your IT infrastructure.
As managing storage is ever more critical, single-instance storage can reduce your storage footprint and save you money.
Companies need some sort of yardstick for comparing the product offerings of different vendors.
Tape continues to be the preferred home for nearly 70 percent of the world's data, especially at the core of the digital revolution: video.
Continuity planning has significant value to offer besides risk reduction; sadly, the benefits are rarely talked about.
Tape plays a continuing role in meeting the storage challenge.
If you’re serious about cutting storage costs by better managing users’ “junk file drawers,” a demo of Novell Storage Manager will be time well spent.
Effective data management is an idea that has been ignored for far too long.
Resellers should spend more time helping customers to spec out what they want their infrastructure to look like over the next few years.
Storage buyers have been conditioned to look for ever-greater "value." We explain why this behavior is so risky.
Data protection budgets are in trouble because executives are getting the wrong pitch from storage pros.
Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.